vulnerability
CentOS Linux: CVE-2017-5843: Moderate: GStreamer security, bug fix, and enhancement update (CESA-2017:2060)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Feb 9, 2017 | Aug 28, 2019 | May 25, 2023 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Feb 9, 2017
Added
Aug 28, 2019
Modified
May 25, 2023
Description
Multiple use-after-free vulnerabilities in the (1) gst_mini_object_unref, (2) gst_tag_list_unref, and (3) gst_mxf_demux_update_essence_tracks functions in GStreamer before 1.10.3 allow remote attackers to cause a denial of service (crash) via vectors involving stream tags, as demonstrated by 02785736.mxf.
Solution(s)
centos-upgrade-clutter-gst2centos-upgrade-clutter-gst2-debuginfocentos-upgrade-clutter-gst2-develcentos-upgrade-gnome-video-effectscentos-upgrade-gstreamer-plugins-bad-freecentos-upgrade-gstreamer-plugins-bad-free-debuginfocentos-upgrade-gstreamer-plugins-bad-free-develcentos-upgrade-gstreamer-plugins-bad-free-devel-docscentos-upgrade-gstreamer-plugins-goodcentos-upgrade-gstreamer-plugins-good-debuginfocentos-upgrade-gstreamer-plugins-good-devel-docscentos-upgrade-gstreamer1centos-upgrade-gstreamer1-debuginfocentos-upgrade-gstreamer1-develcentos-upgrade-gstreamer1-devel-docscentos-upgrade-gstreamer1-plugins-bad-freecentos-upgrade-gstreamer1-plugins-bad-free-debuginfocentos-upgrade-gstreamer1-plugins-bad-free-develcentos-upgrade-gstreamer1-plugins-bad-free-gtkcentos-upgrade-gstreamer1-plugins-basecentos-upgrade-gstreamer1-plugins-base-debuginfocentos-upgrade-gstreamer1-plugins-base-develcentos-upgrade-gstreamer1-plugins-base-devel-docscentos-upgrade-gstreamer1-plugins-base-toolscentos-upgrade-gstreamer1-plugins-goodcentos-upgrade-gstreamer1-plugins-good-debuginfocentos-upgrade-orccentos-upgrade-orc-compilercentos-upgrade-orc-debuginfocentos-upgrade-orc-develcentos-upgrade-orc-doc

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.